[4160] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Linux NLSPATH buffer overflow

daemon@ATHENA.MIT.EDU (Jeff Uphoff)
Thu Mar 13 13:06:36 1997

Date: 	Thu, 13 Mar 1997 12:34:18 -0500
Reply-To: juphoff@nrao.edu
From: Jeff Uphoff <juphoff@TARSIER.CV.NRAO.EDU>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  Your message of Thu, March 13, 1997 17:25:35 +0200

"MS" == Mihai Sandu <mike@thai.oxy.pub.ro> writes:

MS> On Fri, 14 Feb 1997, Alan Cox wrote:
>> libc5.4 is immune, RedHat has been shipping the fixed libc5.3.12 for a long
>> time,

MS> [squid@arbat squid]$ ls -la /lib/libc*
MS> lrwxrwxrwx   1 root     root           14 Feb 21 14:52 /lib/libc.so.5 -> libc.so.5.3.12
MS> -rwxr-xr-x   1 root     root       705995 Sep  2  1996 /lib/libc.so.5.3.12
MS> lrwxrwxrwx   1 root     root           22 Feb 21 14:57 /lib/libcom_err.so -> /lib/libcom_err.so.2.0
MS> lrwxrwxrwx   1 root     root           17 Feb 21 14:59 /lib/libcom_err.so.2 -> libcom_err.so.2.0
MS> -rwxr-xr-x   1 root     root         5819 Sep  1  1996 /lib/libcom_err.so.2.0

What about 'rpm -q libc' to check what version of 5.3.12 you're running?
That'll show if you're lagging behind the patch/fix curve.

MS> So. It works on RedHat 4.0 Colgate with libc v. 5.3.12

That should read "...with an un-fixed libc v. 5.3.12."  (Alan already
made this point!)

Get the most recent RPM(s) from Red Hat's "updates" area and the exploit
shouldn't work any more.

--Up.

--
Jeff Uphoff - Scientific Programming Analyst  |  juphoff@nrao.edu
National Radio Astronomy Observatory          |  juphoff@bofh.org.uk
Charlottesville, VA, USA                      |  jeff.uphoff@linux.org
        PGP key available at: http://www.cv.nrao.edu/~juphoff/

home help back first fref pref prev next nref lref last post